image
image
user-login
Patent search/

METHODOLOGY FOR EXECUTABLE FILE ACQUISITION IN HETEROGENEOUS COMPUTING SYSTEMS

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

METHODOLOGY FOR EXECUTABLE FILE ACQUISITION IN HETEROGENEOUS COMPUTING SYSTEMS

Published

date

Filed on 11 November 2024

Abstract

ABSTRACT Methodology for Executable File Acquisition in Heterogeneous Computing Systems The present disclosure introduces a methodology for executable file acquisition in heterogeneous computing systems 100, designed to streamline and secure the retrieval of executable files across diverse platforms. The invention utilizes modular acquisition tools 102 for cross-platform compatibility, while adaptive algorithms 104 dynamically adjust acquisition strategies based on system attributes. A file type recognition module 106 identifies and classifies executable files, supported by an environment mapping system 108 for optimized acquisition. Process monitoring tools 110 and file system analysis module 112 validate and isolate executable files, while network protocol integration 114 manages secure file transfers across distributed networks. Additional components are security control bypass mechanisms 116, checksum and validation module 118, anomaly detection system 124, metadata enrichment module 126, forensic analysis tools 128, reporting and documentation framework 120, real-time collaboration features 130, and privacy compliance module 142 for regulatory adherence. Reference Fig 1

Patent Information

Application ID202441086923
Invention FieldCOMPUTER SCIENCE
Date of Application11/11/2024
Publication Number46/2024

Inventors

NameAddressCountryNationality
Thirupathigari SrinidhiAnurag University, Venkatapur (V), Ghatkesar (M), Medchal Malkajgiri DT. Hyderabad, Telangana, IndiaIndiaIndia

Applicants

NameAddressCountryNationality
Anurag UniversityVenkatapur (V), Ghatkesar (M), Medchal Malkajgiri DT. Hyderabad, Telangana, IndiaIndiaIndia

Specification

Description:DETAILED DESCRIPTION

[00022] The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognise that other embodiments for carrying out or practising the present disclosure are also possible.

[00023] The description set forth below in connection with the appended drawings is intended as a description of certain embodiments of methodology for executable file acquisition in heterogeneous computing system and is not intended to represent the only forms that may be developed or utilised. The description sets forth the various structures and/or functions in connection with the illustrated embodiments; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimised to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.

[00024] While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.

[00025] The terms "comprises", "comprising", "include(s)", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a setup, or system that comprises a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup or system. In other words, one or more elements in a system or apparatus preceded by "comprises... a" does not, without more constraints, preclude the existence of other elements or additional elements in the system or apparatus.

[00026] In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings and which are shown by way of illustration-specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.

[00027] The present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the description with unnecessary detail.

[00028] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing system 100 is disclosed, in accordance with one embodiment of the present invention. It comprises of modular acquisition tools 102, adaptive algorithms 104, file type recognition module 106, environment mapping system 108, process monitoring tools 110, file system analysis module 112, network protocol integration 114, security control bypass mechanisms 116, checksum and validation module 118, reporting and documentation framework 120, user-friendly interface 122, anomaly detection system 124, metadata enrichment module 126, forensic analysis tools 128, real-time collaboration features 130, cross-platform deployment capability 132, context-aware acquisition profile module 134, multi-phase acquisition module 136, user behavior analytics module 138, adaptive learning module 140, privacy compliance module 142.

[00029] Referring to Fig. 1, the present disclosure provides details of methodology for executable file acquisition in heterogeneous computing system 100. It is a framework designed to streamline and secure the identification, isolation, and acquisition of executable files across diverse computing environments. It enables seamless operation across multiple platforms, optimizing compatibility and security. In one embodiment, the methodology for executable file acquisition in heterogeneous computing systems 100 comprise key components such as modular acquisition tools 102, adaptive algorithms 104, and file type recognition module 106, ensuring compatibility and efficient processing. The system incorporates environment mapping system 108 and process monitoring tools 110 to enhance accuracy in diverse environments. It also features checksum and validation module 118 and reporting and documentation framework 120 to ensure data integrity and traceability. Additional components like privacy compliance module 142 and adaptive learning module 140 further support legal compliance and continuous improvement.

[00030] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with modular acquisition tools 102, designed to facilitate cross-platform file acquisition across various operating systems and file types. These tools adapt to the unique requirements of each environment, allowing for efficient and seamless file handling. modular acquisition tools 102 work in tandem with adaptive algorithms 104 to optimize acquisition by assessing system attributes and adapting to each platform. The tools are also integrated with file type recognition module 106 to ensure compatibility with diverse file formats, supporting uniform file acquisition across the system.

[00031] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with adaptive algorithms 104, which dynamically adjust the acquisition process based on system-specific factors such as file structure and network protocols. adaptive algorithms 104 enhance efficiency by learning the configuration of the environment, optimizing the tools used, and reducing acquisition time. They interact with environment mapping system 108 to gain contextual data, enabling precise adjustments to the acquisition tools. This adaptability helps the methodology handle complex, distributed environments effectively and ensures compatibility across platforms.

[00032] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with file type recognition module 106, which identifies and classifies executable files in real-time. This module uses both signature-based and heuristic techniques to detect file formats such as EXE, DLL, ELF, and Mach-O, making it versatile across different systems. file type recognition module 106 integrates closely with modular acquisition tools 102 to ensure seamless processing of the recognized files. It also coordinates with process monitoring tools 110 to track and isolate executable files during active processes, enhancing the accuracy of acquisition.

[00033] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with environment mapping system 108, which maps the operating environment to understand file system structure, security configurations, and access controls. This system provides essential information to adaptive algorithms 104, enabling optimized and contextualized acquisition. environment mapping system 108 also assists in prioritizing which files to target by identifying constraints and potential access issues. Its integration with network protocol integration 114 ensures that secure protocols are used during file transfer, maintaining data integrity.

[00034] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with process monitoring tools 110, which track and identify active processes, ensuring that all relevant executable files are captured. These tools leverage system APIs to gather real-time data on file execution and resource allocation. process monitoring tools 110 work alongside file system analysis module 112 to validate the file's authenticity and status within the system. By tracking active processes, these tools also contribute to anomaly detection system 124, allowing for prompt identification of irregular activities during acquisition.

[00035] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with file system analysis module 112, which performs in-depth examination of the file system to locate executable files based on attributes like file type, permissions, and usage. file system analysis module 112 works in conjunction with process monitoring tools 110 to filter and isolate files accurately, minimizing false positives. This module also interacts with checksum and validation module 118 to verify file integrity before acquisition, ensuring that only authentic and complete files are processed.

[00036] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with network protocol integration 114, which manages secure data transfer across various network environments, including cloud-based and distributed systems. network protocol integration 114 employs protocols like HTTPS and SFTP to maintain data confidentiality and integrity during acquisition. It coordinates with security control bypass mechanisms 116 to handle permissions and encryption constraints, enabling seamless acquisition across secure networks while ensuring compliance with security protocols.

[00037] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with security control bypass mechanisms 116, designed to obtain legitimate access to restricted executable files by implementing authentication protocols and ethical forensic techniques. security control bypass mechanisms 116 work with environment mapping system 108 to identify access requirements and permissions, facilitating smooth acquisition without compromising security. This component is essential for ensuring that restricted files can be acquired while adhering to ethical and legal standards.

[00038] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with checksum and validation module 118, which ensures the integrity of acquired files by calculating and verifying checksums. This module uses validation techniques to confirm that files are complete and unaltered during the acquisition process. checksum and validation module 118 works closely with file type recognition module 106 and file system analysis module 112 to validate format compatibility, enhancing reliability and reducing the risk of corrupted or incomplete acquisitions.

[00039] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with reporting and documentation framework 120, which maintains comprehensive logs of the entire acquisition process, including audit trails, timestamps, and action details. reporting and documentation framework 120 is integrated with real-time collaboration features 130, allowing multiple users to access reports and contribute to the documentation process in real-time. This framework also supports compliance audits by providing a transparent and detailed record of acquisition activities.

[00040] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with user-friendly interface 122, designed to make the acquisition process intuitive and accessible for IT professionals and cybersecurity analysts. user-friendly interface 122 presents an organized dashboard of all components, enabling easy configuration and monitoring. It integrates with context-aware acquisition profile module 134 to allow customization based on user needs, streamlining the acquisition process for specific scenarios or environments.

[00041] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with anomaly detection system 124, which employs machine learning to monitor and detect irregularities in the acquisition process. anomaly detection system 124 continuously analyzes data from process monitoring tools 110 and network protocol integration 114 to identify unusual access patterns or file behaviors. This component provides real-time alerts, enhancing security and enabling prompt response to potential threats or issues during acquisition.

[00042] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with metadata enrichment module 126, which gathers and enhances metadata associated with executable files, such as creation date, access history, and permissions. metadata enrichment module 126 collaborates with file type recognition module 106 to classify and label files accurately, supporting forensic analysis and compliance requirements. This enriched metadata provides valuable context for stakeholders, aiding in the analysis and auditing process.

[00043] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with forensic analysis tools 128, built-in tools that allow immediate examination of acquired files for potential risks, including malware or vulnerabilities. forensic analysis tools 128 work alongside checksum and validation module 118 to verify file authenticity before analysis. By conducting preliminary assessments, these tools enable cybersecurity professionals to respond promptly to any threats identified during acquisition.

[00044] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with real-time collaboration features 130, which allow multiple users to participate in and monitor the acquisition process simultaneously. real-time collaboration features 130 work with reporting and documentation framework 120 to provide shared access to logs, reports, and acquisition status updates, enhancing teamwork and efficiency in complex environments. This collaborative capability is especially useful in scenarios requiring input from diverse IT and security teams.

[00045] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with cross-platform deployment capability 132, enabling the methodology to operate across various platforms, including local machines, virtual machines, and cloud environments. cross-platform deployment capability 132 ensures that modular acquisition tools 102 and adaptive algorithms 104 can function seamlessly in any environment, enhancing scalability and flexibility of the system.

[00046] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with context-aware acquisition profile module 134, which allows for the creation of customizable acquisition profiles that cater to specific environments or use cases. context-aware acquisition profile module 134 integrates with user-friendly interface 122 to offer tailored configurations, ensuring that the acquisition methodology can adapt to unique operational requirements and optimize resource allocation.

[00047] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with multi-phase acquisition module 136, which structures the acquisition process into distinct phases, including reconnaissance and detailed extraction. multi-phase acquisition module 136 coordinates with adaptive algorithms 104 to prioritize acquisition steps, ensuring all relevant executable files are identified and securely acquired. This phased approach improves accuracy and efficiency, particularly in complex, distributed environments.

[00048] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with user behavior analytics module 138, which monitors and analyzes user interactions with the acquisition tools to identify patterns and optimize user experience. user behavior analytics module 138 works with anomaly detection system 124 to detect any suspicious behavior, helping to mitigate potential insider threats. It also provides insights for refining interface design and enhancing security protocols.

[00049] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with adaptive learning module 140, which uses historical acquisition data to improve efficiency and refine algorithms over time. adaptive learning module 140 collaborates with adaptive algorithms 104 to adjust acquisition strategies based on past outcomes, ensuring continuous optimization. This feature enables the system to respond more effectively to new environments and evolving file acquisition challenges.

[00050] Referring to Fig. 1, methodology for executable file acquisition in heterogeneous computing systems 100 is provided with privacy compliance module 142, ensuring that all acquisition activities adhere to data privacy regulations, such as GDPR and CCPA. privacy compliance module 142 works with security control bypass mechanisms 116 to maintain compliance while accessing restricted files, providing safeguards against unauthorized data handling. This component supports legal compliance and reinforces trust in the acquisition process across diverse systems.

[00051] Referring to Fig 2, there is illustrated method 200 for methodology for executable file acquisition in heterogeneous computing systems 100. The method comprises:
At step 202, method 200 includes user initiating the acquisition process through the user-friendly interface 122 to select target environments and configure settings in the context-aware acquisition profile module 134;
At step 204, method 200 includes the environment mapping system 108 gathering details about the target environment, including operating system, file structure, and security settings to provide contextual data to adaptive algorithms 104;
At step 206, method 200 includes adaptive algorithms 104 adjusting the acquisition strategy based on the mapped environment details, optimizing tool selection and acquisition parameters accordingly;
At step 208, method 200 includes file type recognition module 106 identifying executable files within the system, classifying file formats such as EXE, DLL, ELF, and Mach-O based on file signatures and metadata;
At step 210, method 200 includes process monitoring tools 110 tracking active processes to detect executable files in real-time, sharing this data with file system analysis module 112 for validation and isolation of files;
At step 212, method 200 includes file system analysis module 112 conducting an in-depth analysis of the file system to confirm executable file attributes, permissions, and storage locations, ensuring only relevant files are isolated;
At step 214, method 200 includes security control bypass mechanisms 116 managing access permissions and handling any authentication requirements for restricted files, securing access in compliance with security protocols;
At step 216, method 200 includes network protocol integration 114 transferring isolated executable files securely across distributed environments, utilizing protocols like HTTPS or SFTP to maintain data integrity during acquisition;
At step 218, method 200 includes checksum and validation module 118 verifying the integrity and authenticity of each acquired file by calculating checksums and validating format consistency;
At step 220, method 200 includes anomaly detection system 124 monitoring the acquisition process for irregularities, with real-time alerts triggered if any unusual file behaviors or access patterns are detected;
At step 222, method 200 includes metadata enrichment module 126 collecting additional file details, such as creation date and permissions, enhancing file context for further analysis;
At step 224, method 200 includes forensic analysis tools 128 conducting a preliminary security assessment on the acquired files, checking for potential malware or vulnerabilities;
At step 226, method 200 includes reporting and documentation framework 120 logging each acquisition step, creating an audit trail with timestamps, actions, and any detected anomalies, supporting compliance and forensic records;
At step 228, method 200 includes real-time collaboration features 130 allowing multiple users to access acquisition logs and reports, promoting teamwork during the acquisition process;
At step 230, method 200 includes adaptive learning module 140 analyzing past acquisition data to refine adaptive algorithms 104 and improve future acquisition efficiency;
At step 232, method 200 includes privacy compliance module 142 ensuring all acquired data complies with regulations like GDPR or CCPA, safeguarding sensitive data and supporting legal compliance throughout the acquisition process.


[00052] In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "fixed" "attached" "disposed," "mounted," and "connected" are to be construed broadly, and may for example be fixedly connected, detachably connected, or integrally connected, either mechanically or electrically. They may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.

[00053] Modifications to embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as "including", "comprising", "incorporating", "have", "is" used to describe and claim the present disclosure are intended to be construed in a non- exclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural where appropriate.

[00054] Although embodiments have been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this disclosure. More particularly, various variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the present disclosure, the drawings and the appended claims. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
, Claims:WE CLAIM:
1. A methodology for executable file acquisition in heterogeneous computing systems 100 comprising of
modular acquisition tools 102 to facilitate cross-platform file acquisition across various operating systems and file types;
adaptive algorithms 104 to dynamically adjust acquisition strategy based on environment details;
file type recognition module 106 to identify and classify executable files across different formats;
environment mapping system 108 to gather and analyze system environment data for optimized acquisition;
process monitoring tools 110 to track active processes and detect executable files in real-time;
file system analysis module 112 to conduct in-depth analysis of file attributes, permissions, and locations;
network protocol integration 114 to securely transfer executable files across distributed networks;
security control bypass mechanisms 116 to manage access permissions and authentication for restricted files;
checksum and validation module 118 to verify the integrity and authenticity of acquired files;
reporting and documentation framework 120 to log acquisition steps, actions, and anomalies;
user-friendly interface 122 to provide a simple and accessible acquisition process for users;
anomaly detection system 124 to monitor for irregularities in file behavior during acquisition;
metadata enrichment module 126 to collect additional data, enhancing file context for analysis;
forensic analysis tools 128 to assess acquired files for potential malware or vulnerabilities;
real-time collaboration features 130 to enable teamwork and shared access to acquisition logs;
cross-platform deployment capability 132 to support operation across local, virtual, and cloud environments;
context-aware acquisition profile module 134 to allow customizable acquisition profiles for specific environments;
multi-phase acquisition module 136 to structure acquisition into reconnaissance and extraction phases;
user behavior analytics module 138 to monitor interactions with acquisition tools for security and usability;
adaptive learning module 140 to improve acquisition efficiency through analysis of past data; and
privacy compliance module 142 to ensure data acquisition complies with privacy regulations like GDPR and CCPA.
2. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein modular acquisition tools 102 is configured to operate across multiple operating systems and file formats, enabling seamless acquisition of executable files from diverse computing environments.

3. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein adaptive algorithms 104 are configured to dynamically adjust acquisition processes based on system-specific parameters, optimizing performance across varied environments.

4. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein file type recognition module 106 is configured to identify and classify executable files using signature-based and heuristic techniques, ensuring compatibility with diverse file formats such as EXE, DLL, ELF, and Mach-O.

5. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein environment mapping system 108 is configured to analyze the target system's environment, providing critical data such as file structure, permissions, and security settings to support context-aware acquisition strategies.

6. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein security control bypass mechanisms 116 are configured to manage permissions and authentication requirements, enabling compliant access to restricted executable files while maintaining adherence to security protocols.

7. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein checksum and validation module 118 is configured to verify the integrity of acquired files through checksum calculations and format validation, ensuring data authenticity and preventing corruption during acquisition.

8. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein anomaly detection system 124 is configured to monitor file acquisition activities in real-time, detecting irregularities or unauthorized access attempts and issuing alerts to ensure secure and reliable acquisition.

9. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein privacy compliance module 142 is configured to ensure that the acquisition process adheres to data privacy regulations such as GDPR and CCPA, safeguarding sensitive information and supporting lawful data handling practices across systems.

10. The methodology for executable file acquisition in heterogeneous computing systems 100 as claimed in claim 1, wherein method comprises
user initiating the acquisition process through the user-friendly interface 122 to select target environments and configure settings in the context-aware acquisition profile module 134;
environment mapping system 108 gathering details about the target environment, including operating system, file structure, and security settings to provide contextual data to adaptive algorithms 104;
adaptive algorithms 104 dynamically adjusting acquisition strategy based on mapped environment details, optimizing tool selection and acquisition parameters accordingly;
file type recognition module 106 identifying executable files within the system, classifying file formats such as EXE, DLL, ELF, and Mach-O based on file signatures and metadata;
process monitoring tools 110 tracking active processes to detect executable files in real-time, sharing data with file system analysis module 112 for validation and isolation of files;
file system analysis module 112 conducting an in-depth analysis of the file system to confirm executable file attributes, permissions, and storage locations, ensuring only relevant files are isolated;
security control bypass mechanisms 116 managing access permissions and handling any authentication requirements for restricted files, securing access in compliance with security protocols;
network protocol integration 114 transferring isolated executable files securely across distributed environments, utilizing protocols like HTTPS or SFTP to maintain data integrity during acquisition;
checksum and validation module 118 verifying the integrity and authenticity of each acquired file by calculating checksums and validating format consistency;
anomaly detection system 124 monitoring the acquisition process for irregularities, with real-time alerts triggered if any unusual file behaviors or access patterns are detected;
metadata enrichment module 126 collecting additional file details, such as creation date and permissions, enhancing file context for further analysis;
forensic analysis tools 128 conducting a preliminary security assessment on the acquired files, checking for potential malware or vulnerabilities;
reporting and documentation framework 120 logging each acquisition step, creating an audit trail with timestamps, actions, and any detected anomalies, supporting compliance and forensic records;
real-time collaboration features 130 allowing multiple users to access acquisition logs and reports, promoting teamwork during the acquisition process;
adaptive learning module 140 analyzing past acquisition data to refine adaptive algorithms 104 and improve future acquisition efficiency;
privacy compliance module 142 ensuring all acquired data complies with regulations like GDPR or CCPA, safeguarding sensitive data and supporting legal compliance throughout the acquisition process.

Documents

NameDate
202441086923-COMPLETE SPECIFICATION [11-11-2024(online)].pdf11/11/2024
202441086923-DECLARATION OF INVENTORSHIP (FORM 5) [11-11-2024(online)].pdf11/11/2024
202441086923-DRAWINGS [11-11-2024(online)].pdf11/11/2024
202441086923-EDUCATIONAL INSTITUTION(S) [11-11-2024(online)].pdf11/11/2024
202441086923-EVIDENCE FOR REGISTRATION UNDER SSI [11-11-2024(online)].pdf11/11/2024
202441086923-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-11-2024(online)].pdf11/11/2024
202441086923-FIGURE OF ABSTRACT [11-11-2024(online)].pdf11/11/2024
202441086923-FORM 1 [11-11-2024(online)].pdf11/11/2024
202441086923-FORM FOR SMALL ENTITY(FORM-28) [11-11-2024(online)].pdf11/11/2024
202441086923-FORM-9 [11-11-2024(online)].pdf11/11/2024
202441086923-POWER OF AUTHORITY [11-11-2024(online)].pdf11/11/2024
202441086923-REQUEST FOR EARLY PUBLICATION(FORM-9) [11-11-2024(online)].pdf11/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.